#38 SHA ( Secure Hash Algorithm )Algorithm with example |CNS|

preview_player
Показать описание
Abroad Education Channel :

Company Specific HR Mock Interview :
A seasoned professional with over 18 years of experience with Product, IT Services and Agri industry of valuable experience in Human Resource Management, Extensive Experience in Talent Acquisition, Personnel Management, Compensation and Benefits, Performance Reviews, Training & Development and all facets of Human Resources will be performing mock HR Interviews and provides feedback on the session and guides with interview techniques.

paper presentation for semester exams :
Рекомендации по теме
Комментарии
Автор

I came across many channels, you are the one who explains cybersecurity really in very simpler way. Thanks

siddaramuk
Автор

Pov : a night before before exam, 2x speed, earphone, and one last thing Full on Concentration 😂😂😂... Anyone ❤

yashwanthkolipaka
Автор

Seriously i sware your beautiful voice and explanation

Randoms_Talks
Автор

Tq madam 🥰🥰I have just finished my exam. ur teaching help me alot❤️

TechSupportRoman
Автор

Hlw Mam, I had subscribed to your channel when I took admission in engineering, today I am in the final year and i am going to be engineering all credits goes to

rajprasad
Автор

As there are 5 variables we need to perform 5 round in the last step?

-neerajajadhav
Автор

In the previous video MD 5 u said that there are 4 variables so 4 rounds, here there are 5 variables so it shd be 5 rounds ryt? but you have mentioned 4 fours ?? plz clarify my doubts?..and also it would have been better if u explained abt the 20 steps at the final stage!

preethis
Автор

We need video classes for better experience of understanding ma'am 😊

munijayavarmasingam
Автор

what kind of questions can come in exam related to MD5? Just remembering all steps will be enough to pass to the topic? or is there will be some kind of calculation type of question? please guide

TheAajtv
Автор

From the SHA we will be having SHA-1, SHA-128, SHA-256, SHA-513, should we need to write these things in exam ?

basavamgarimanohar
Автор

Here in the 5th step there will 5 rounds right since it has 5chaining varialbes

_sufiyan
Автор

why you have not provided proper exaples for tgis topics maam???

pujanprajaprati
Автор

Mam can please explain random oracle model and whrilpool in hash function

keerthinarala
Автор

Hi, As per MD5,



1.a = b + (a + p(b, c, d, e)+m[i] + T[k])


2.b = a + (b + p(a, c, d, e) + m[i] + T[k])


3.c = d + (c + p(a, b, d, e) + m[i] + T[k])


4.d = c + (d + p(a, b, c, e) +m[i] + T[k])

I calculated for 4 variables..
what about 5th variable e?

tomjerry
Автор

We have 5 chaining variables right, so we have to do 5 rounds or 4 rounds only

Kittu
Автор

How the 160 bits output?
then in MD5 four rounds, each round for one variable as there are four variables, but in SHA we are having 5 Variables A, B, C, D, E then how four rounds will be sufficient?

RaviKumar-iwgq
Автор

Why you have mentioned "with example" ?

shauryapratapsingh
Автор

can you provide notes for SHA algorithm?

hetshah
Автор

why disnt we have 5 rounds when we have 5 variables??

bhupeshmehra
Автор

why didnt we have 5 rounds in last step when we have 5 variables

bhupeshmehra